AFTER COMPLETING THIS CHAPTER, YOU WILL BE ABLE TO:
Define the term netiquette and explain its derivation.
Understand what it means to "spam" someone on the Internet, and what to do if someone spams you.
Be prepared to protect yourself against unethical users who use e-mail to spread hoaxes and send viruses that can damage your computer or the programs and data it contains.
Understand the concept of lurking, and know when you should lurk.
Know what it means to "flame" someone on the Internet.
Understand the concept of SHOUTING on the Internet and become sensitized to not overdoing it.
Recognize the more common smileys and other emoticons used on the Internet, and know how to look up the meaning of less common symbols.
Understand what the more common three-letter acronyms mean, and know where to go on the Web to look up more esoteric acronyms.
Understand some of the more commonly used Internet jargon, and know where to find a more complete listing of Internet terms and definitions.

INTERNET LITERACY RESOURCES:

 Netiquette Guidelines
 

Which of these sets of guidelines seem most useful in your present situation? Are there any that seem too restrictive or too broad?


ietf

RFC 1855: Netiquette Guidelines
published by the Internet Engineering Task Force

The Net: User Guidelines and Netiquette
by Arlene Rinaldi

Bill of Rights and Responsibilities for Electronic Learners


Intellectual Honesty in the Era of Computing
by Dr. Frank W. Connolly, The American University, Washington, D.C.

The Ten Commandments of Computer Ethics

Ethics Links



Spam
 

After reviewing these sites, decide how you think you'll handle spam. How important do you think it is to limit spam? What steps would you be willing to take to stop spam?


The CAN-SPAM Act
Senate Toughens CAN-SPAM
E-mail Authentication Summit

A Sample of Spam

How To Complain To The Spammer's Provider

Blacklist of Internet Advertisers


CAUCE



Hoaxes
 

Have you ever received e-mail spreading one or more of these hoaxes? How would you decide if the information was true or a hoax?


CIAC HoaxBusters

CIAC Hoax Pages

About.com

Netlore: Rumors, Hoaxes & Urban Legends



Viruses
 

What is the difference between a virus and a hoax? Where do the two problems overlap?

About.com Antivirus page
McAfee Antivirus

Symantec Security Response




Emoticons
 

These sites provide lots of ways to express yourself using a special shorthand. Find two or three that you can use to communicate with your friends.


Emoticons from the Computer User High Tech Dictionary

The Unofficial Smiley Dictionary
NetLingo Smiley Dictionary


Three Letter Acronyms (TLAs)
 

Which of these acronyms made you ROTFL? Which one is your favorite for saying CU?


Sharpened.net: E-mail and Chat Acronyms

Online Acronyms and Emoticons


Jargon
 

Which of this jargon has already found its way into common usage? Which seems far too technical to ever become common?





The Internet Language Dictionary



Progressive Case: Acceptable Use Policies
 

These resources should prove helpful in working through this chapter's case.


Virginia - Acceptable Use Policies: A Handbook

PROJECT INTERCONNECT Acceptable Use Policy Primer
Safe and Responsible Use of the Internet: A Guide for Educators



-

^Top

Home/\

>

Previous Chapter

Summary of this Chapter

Table of Contents

Next Chapter


Book Cover This page is part of the Internet Literacy Web site.
FIND OUT MORE
about Internet Literacy, the new book by Fred T. Hofstetter
published by Irwin/McGraw-Hill

Copyright © 2005 by the University of Delaware. All rights reserved.
Site design and development by Pat Sine.
Please send all comments to Pat Sine: sine@udel.edu